Skip to main content

Internet-of-Things with Blockchain Technology: State-of-the Art and Potential Challenges

  • Chapter
  • First Online:
Handbook of Multimedia Information Security: Techniques and Applications

Abstract

The paradigm of Internet-of-Things (IoT) is flooring the way of daily-life activities which are interconnected as well as interact with their environment in order to collect information and automate certain tasks. Therefore, the seamless authentication, data privacy, security, robustness against attacks, easy deployment, and self-maintenance among other things are the potential parameters of the systems which can be fetched by blockchain technology. This chapter systematically presents the adaption of blockchain technology to fulfil the specific demands of IoT in order to develop Blockchain-integrated IoT (BIoT) for medical applications/e-healthcare. With the discussion of basics of blockchain technology, the most relevant BIoT applications such as e-healthcare has been explored and its impact over traditional cloud-centred IoT applications is presented. Moreover, the present potential challenges and possible optimizations are detailed regarding several aspects that affect the design, development, and deployment of a BIoT application. Finally, the potential recommendations are numbered to guide the researchers/developers on the issues which will have to be commenced before deploying the next generation of BIoT applications.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 219.00
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 279.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info
Hardcover Book
USD 279.99
Price excludes VAT (USA)
  • Durable hardcover edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  1. M. Weiser, “Hot topics-ubiquitous computing”, Computer, 26(10), 71–72, 1993.

    Article  Google Scholar 

  2. Forecast: The Internet of Things, Worldwide, 2013, Gartner, Stamford, CA, USA, Nov. 2013.

    Google Scholar 

  3. White Paper: Cisco Visual Networking Index: Global Mobile Data Traffic Forecast Update, 2016–2021. San Jose, CA, USA, Mar. 2017.

    Google Scholar 

  4. M. Suárez-Albela, P. Fraga-Lamas, T. M. Fernández-Caramés, A. Dapena, and M. González-López, “Home automation system based on intelligent transducer enablers,” Sensors, vol. 16, no. 10, no. 1595, pp. 1–26, Sep. 2016.

    Article  Google Scholar 

  5. P. Triantafillou, N. Ntarmos, S. Nikoletseas, and P. Spirakis, “NanoPeer networks and P2P worlds,” in Proc. 3rd Int. Conf. Peer-Peer Comput., Linkoping, Sweden, Sep. 2003, pp. 40–46.

    Google Scholar 

  6. M. Ali and Z. A. Uzmi, “CSN: A network protocol for serving dynamic queries in large-scale wireless sensor networks,” in Proc. 2nd Annu. Conf. Commun. Netw. Services Res., Fredericton, NB, Canada, May 2004, pp. 165–174.

    Google Scholar 

  7. S. Krco, D. Cleary, and D. Parker, “P2P mobile sensor networks,” in Proc. 38th Annu. Hawaii Int. Conf. Syst. Sci., Big Island, HI, USA, Jan. 2005, p. 324c.

    Google Scholar 

  8. Tiago M. Fernández-Caramés, and Paula Fraga-Lamas, “A Review on the Use of Blockchain for the Internet of Things,” IEEE Access, vol. 6, pp. 32979–33001, 2018.

    Google Scholar 

  9. Device Democracy: Saving the Future of the Internet of Things, IBM, New York, NY, USA, 2015.

    Google Scholar 

  10. K. Christidis and M. Devetsikiotis, “Blockchains and smart contracts for the Internet of Things,” IEEE Access, vol. 4, pp. 2292–2303, 2016.

    Article  Google Scholar 

  11. J. Yli-Huumo, D. Ko, S. Choi, S. Park, and K. Smolander, “Where is current research on blockchain technology?—A systematic review,”PLoS ONE, vol. 11, no. 10, p. e0163477, 2016.

    Google Scholar 

  12. J. S. Preden, K. Tammemäe, A. Jantsch, M. Leier, A. Riid, and E. Calis, “The benefits of self-awareness and attention in fog and mist computing,” Computer, vol. 48, no. 7, pp. 37–45, Jul. 2015.

    Article  Google Scholar 

  13. M. Suárez-Albela, T. M. Fernández-Caramés, P. Fraga-Lamas, and L. Castedo, “A practical evaluation of a high-security energy-efficient gateway for IoT fog computing applications,” Sensors, vol. 17, no. 9, p. 1978, Aug. 2017.

    Google Scholar 

  14. D. Datla et al., “Wireless distributed computing: A survey of research challenges,” IEEE Commun. Mag., vol. 50, no. 1, pp. 144–152, Jan. 2012.

    Google Scholar 

  15. H. Cai, B. Xu, L. Jiang, and A. V. Vasilakos, “Iot-based big data storage systems in cloud computing: Perspectives and challenges,” IEEE Internet Things J., vol. 4, no. 1, pp. 75–87, Jan. 2017.

    Google Scholar 

  16. M. Marjani et al., “Big IoT data analytics: Architecture, opportunities, and open research challenges,” IEEE Access, vol. 5, pp. 5247–5261, 2017.

    Google Scholar 

  17. Panarello, A., Tapas, N., Merlino, G., Longo, F., & Puliafito, A. (2018). Blockchain and IoT Integration: A Systematic Survey. Sensors, 18(8), 2575.

    Google Scholar 

  18. A. Lei, H. Cruickshank, Y. Cao, P. Asuquo, C. P. A. Ogah, and Z. Sun, “Blockchain-based dynamic key management for heterogeneous intelligent transportation systems,” IEEE Internet Things J., vol. 4, no. 6, pp. 1832–1843, Dec. 2017.

    Article  Google Scholar 

  19. N. Kshetri, “Can blockchain strengthen the Internet of Things?” IT Professional, vol. 19, no. 4, pp. 68–72, 2017.

    Article  Google Scholar 

  20. N. Kshetri, “Blockchain’s roles in strengthening cybersecurity and protecting privacy,” Telecommun. Policy, vol. 41, no. 10, pp. 1027–1038, 2017.

    Article  Google Scholar 

  21. O. Blanco-Novoa, T. M. Fernández-Caramés, P. Fraga-Lamas, and L. Castedo, “An electricity-price aware open-source smart socket for the internet of energy,” Sensors, vol. 17, no. 3, p. 643, Mar. 2017.

    Article  Google Scholar 

  22. M. A. Salahuddin, A. Al-Fuqaha, M. Guizani, K. Shuaib, and F. Sallabi, “Softwarization of Internet of Things infrastructure for secure and smart healthcare,” Computer, vol. 50, no. 7, pp. 74–79, Jul. 2017.

    Article  Google Scholar 

  23. Q. Xu, P. Ren, H. Song, and Q. Du, “Security enhancement for IoT communications exposed to eavesdroppers with uncertain locations,” IEEE Access, vol. 4, pp. 2840–2853, 2016.

    Article  Google Scholar 

  24. T. Yu, X. Wang, and A. Shami, “Recursive principal component analysisbased data outlier detection and sensor data aggregation in IoT systems,” IEEE Internet Things J., vol. 4, no. 6, pp. 2207–2216, Dec. 2017.

    Google Scholar 

  25. N. Li, D. Liu, and S. Nepal, “Lightweight mutual authentication for IoT and its applications,” IEEE Trans. Sustain. Comput., vol. 2, no. 4, pp. 359–370, Oct./Dec. 2017.

    Google Scholar 

  26. P. Fraga-Lamas, D. Noceda-Davila, T. M. Fernández-Caramés, M. Díaz-Bouza, and M. Vilar-Montesinos, “Smart pipe system for a shipyard 4.0” Sensors, vol. 16, no. 12, p. 2186, Dec. 2016.

    Google Scholar 

  27. D. L. Hernández-Rojas, T. M. Fernández-Caramés, P. Fraga-Lamas, and C. J. Escudero, “Design and practical evaluation of a family of lightweight protocols for heterogeneous sensing through BLE beacons in IoT telemetry applications,” Sensors, vol. 18, no. 1, p. 57, Dec. 2017.

    Article  Google Scholar 

  28. S. Meiklejohn et al., “A fistful of bitcoins: Characterizing payments among men with no names,” Commun. ACM, vol. 59, no. 4, pp. 86–93, Apr. 2016.

    Google Scholar 

  29. T. M. Fernández-Caramés, P. Fraga-Lamas, M. Suárez-Albela, and L. Castedo, “Reverse engineering and security evaluation of commercial tags for RFID-based IoT applications,” Sensors, vol. 17, no. 1, p. 28, Dec. 2016.

    Article  Google Scholar 

  30. R. M. Jabir, S. I. R. Khanji, L. A. Ahmad, O. Alfandi, and H. Said, “Analysis of cloud computing attacks and countermeasures,” in Proc. 18th Int. Conf. Adv. Commun. Technol. (ICACT), Pyeongchang, South Korea, Jan./Feb. 2016.

    Google Scholar 

  31. S. Miyake and M. Bandai, “Energy-efficient mobile P2P communications based on context awareness,” in Proc. IEEE 27th Int. Conf. Adv. Inf. Netw. Appl. (AINA), Barcelona, Spain, Mar. 2013, pp. 918–923.

    Google Scholar 

  32. E. Birrell and F. B. Schneider, “Federated identity management systems: A privacy-based characterization,” IEEE Security Privacy, vol. 11, no. 5, pp. 36–48, Sep./Oct. 2013.

    Google Scholar 

  33. P. K. Sharma, M.-Y. Chen, and J.-H. Park, “A software defined fog node based distributed blockchain cloud architecture for IoT,” IEEE Access, vol. 6, pp. 115–124, Sep. 2017.

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Ghanshyam Singh .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2019 Springer Nature Switzerland AG

About this chapter

Check for updates. Verify currency and authenticity via CrossMark

Cite this chapter

Singh, G. (2019). Internet-of-Things with Blockchain Technology: State-of-the Art and Potential Challenges. In: Singh, A., Mohan, A. (eds) Handbook of Multimedia Information Security: Techniques and Applications. Springer, Cham. https://doi.org/10.1007/978-3-030-15887-3_37

Download citation

  • DOI: https://doi.org/10.1007/978-3-030-15887-3_37

  • Published:

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-030-15886-6

  • Online ISBN: 978-3-030-15887-3

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics